A heap-based buffer overflow vulnerability exists in the sphere.c start_read() functionality of Sound Exchange libsox 14.4.2 and master commit 42b3557e. A specially-crafted file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
References
Configurations
History
24 Jun 2025, 19:34
Type | Values Removed | Values Added |
---|---|---|
First Time |
Sound Exchange Project sound Exchange
Sound Exchange Project |
|
CPE | cpe:2.3:a:sound_exchange_project:sound_exchange:14.4.2:*:*:*:*:*:*:* |
21 Nov 2024, 06:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2023/02/03/3 - | |
References | () https://lists.debian.org/debian-lts-announce/2023/02/msg00009.html - | |
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2021-1434 - Exploit, Third Party Advisory | |
References | () https://www.debian.org/security/2023/dsa-5356 - |
Information
Published : 2022-04-14 20:15
Updated : 2025-06-24 19:34
NVD link : CVE-2021-40426
Mitre link : CVE-2021-40426
CVE.ORG link : CVE-2021-40426
JSON object : View
Products Affected
sound_exchange_project
- sound_exchange